


default search action
Journal of Computer Science, Volume 10
Volume 10, Number 1, 2014
- G. PadmaPriya

, K. Duraiswamy:
An Approach for Text Summarization using Deep Learning Algorithm. 1-9 - Bayu Kanigoro

, Widodo Budiharto
, Jurike V. Moniaga, Muhsin Shodiq:
Web based Conference System for Intelligence Telepresence robot: a Framework. 10-14 - Jeyanthi Prabhu, V. Jawahar Senthil Kumar:

Wavelet based Content based Image Retrieval using Color and texture Feature Extraction by Gray Level Coocurence Matrix and Color Coocurence Matrix. 15-22 - Hala Albaroodi, Selvakumar Manickam

, Parminder Singh Bawa
:
Critical Review of OpenStack Security: Issues and Weaknesses. 23-33 - Thiruvengatanadhan Ramalingam, P. Dhanalakshmi

:
Speech/Music Classification using wavelet based Feature Extraction Techniques. 34-44 - J. Mannar Mannan, Murugesan Sundarambal, S. Raghul:

Selection of Ontology for Web Service Description Language to Ontology Web Language conversion. 45-53 - Munaisyah Abdullah

, Salwani Abdullah, Abdul Razak Hamdan, Roslan Ismail:
Optimization Model of Selective cutting for timber Harvest Planning based on a Simulated Annealing Approach. 54-65 - S. T. Sadish Kumar, N. Kasthuri:

Determination of epileptic Disorder with discrete wavelet transforms and Neural Network Classifier. 66-72 - Aram Baruch González Perez, Jorge Adolfo Ramírez Uresti

:
Strategy Patterns Prediction Model. 73-84 - Poonkuzhali Ramadoss, Sanavullah Mohamed Yakub, Sabari Annaji:

A Preemptive Link State Spanning Tree Source Routing Protocol for Mobile Adhoc Networks. 85-90 - Govindaraju Kavya, V. Thulasi Bai:

Design and Implementation of Global Positioning System receiver in field Programmable gate array with Short Message Service. 91-98 - Mustafa M. H. Ibrahim, Mohd. Hasbullah Omar

, Adib M. Monzer Habbal
, Khuzairi Mohd Zaini
:
Analysis of Internet Traffic in Educational Network based on Users' Preferences. 99-105 - V. Saishanmuga Raja

, S. P. Rajagopalan
:
A Comparative Analysis of Optimization Techniques for Artificial Neural Network in Bio Medical Applications. 106-114 - P. Karthigayani, Sridhar Sundaramoorthy:

Decision Tree based Occlusion Detection in Face Recognition and estimation of Human Age using Back Propagation Neural Network. 115-127 - Adriano Cesar Ribeiro, Alex Roschildt Pinto

, Geraldo Francisco Donegá Zafalon
, Daniel Fernando Pigatto
, Kalinka Castelo Branco, Adriano Mauro Cansian:
An Approach to mitigate Denial of Service Attacks in IEEE 802.11 Networks. 128-137 - Thangavel Prem Jacob, Thavasi Anandam Ravi:

A Novel Approach for Test Suite prioritization. 138-142 - Mohan Raj Velayudhan Kumar, Shriram Raghunathan

:
Energy Efficient and Interference Aware Provisioning in Virtualized Server Cluster Environment. 143-156 - Ro'fah Nur Rachmawati

, Sufon, Widodo Budiharto
:
European Call option Application in Incomplete Market-Analysis and Development. 157-168 - Mohammed Jamil Elhalabi, Selvakumar Manickam

, Loai Bani Melhim
, Mohammed Anbar
, Huda Alhalabi:
A Review of Peer-to-Peer Botnet Detection Techniques. 169-177 - S. Selva Nidhyananthan

, R. Shantha Selva Kumari
:
A Framework for Multilingual Text- Independent speaker identification System. 178-189
Volume 10, Number 2, 2014
- Prabhu Jayagopal

, Malmurugan Nagarajan:
A Novel prioritization Algorithm Model based Test-Suite Generation using Regression Testing. 190-197 - Sabitha Gauni

, Kumar Ramamoorthy
:
Analysis of Reduction in Complexity of Multiple input- Multiple output-orthogonal frequency Division Multiplexing Systems with carrier frequency offset estimation and correction. 198-209 - Sarfraz Nawaz Brohi

, Mervat Adib Bamiah
, Suriayati Chuprat, Jamalul-lail Ab Manan:
Design and Implementation of a Privacy Preserved off-Premises Cloud Storage. 210-223 - D. V. Pradeep Sankar, K. Muneeswaran:

Reducing Call Blocking Probability in Hybrid Multicast wavelength Division Multiplexing Networks using Weighted Routing and wavelength Assignment Algorithm. 224-232 - Rawan Baroudy, Bassam Lala:

Computer-Aided Decision System for Refractive surgeries with excimer laser. 233-239 - Mervat Adib Bamiah

, Sarfraz Nawaz Brohi
, Suriayati Chuprat, Jamalul-lail Ab Manan:
Trusted Cloud Computing Framework for Healthcare Sector. 240-250 - Adi Narayana Reddy Kaipa

, Vishnu Vardhan Bulusu
, Ramakrishna Reddy Koduru, Durga Prasad Kavati
:
A Hybrid Cryptosystem using variable Length sub Key Groups and Byte Substitution. 251-254 - R. Nandhini, N. Devarajan:

A Cross-Layer Scheduler with channel State Information for guaranteed Quality of Service. 255-263 - SitiZubaidahMohd Tumari, Rubita Sudirman, Abdul Hamid Ahmad:

Event-Related potentials Extraction of Working Memory using wavelet Algorithm. 264-271 - Shriram K. Vasudevan, P. L. K. Priyadarsini

, Kaushik Velusamy
, Balachandran Arumugam:
An Efficient/Enhanced Content based Image Retrieval for a Computational Engine. 272-284 - Victor Ceronmani Sharmila

, George Amalanathan:
Construction of Strategic Connected Dominating Set for Mobile Ad Hoc Networks. 285-295 - Hanan Aljuaid

, Dzulkifli Mohamad:
Child video Dataset Tool to Develop Object tracking simulates Babysitter Vision robot. 296-304 - Iman A. Saad, Loay Edwar George, Ahmad Tayyar:

Accurate and Fast pupil localization using contrast stretching, Seed Filling and circular Geometrical Constraints. 305-315 - Lau Chee Yong

, Tan Tian Swee
:
Low footprint High intelligibility Malay speech synthesizer based on Statistical Data. 316-324 - A. Vasanthi, T. Purusothaman:

Optimizing batch Rekeying interval for Secure Group Communication based on Queuing Model. 325-329 - N. Shanmugapriya, R. Nallusamy

:
A New Content based Image Retrieval System using GMM and Relevance feedback. 330-340 - Dennise Adrianto:

Comparison using Particle Swarm Optimization and Genetic Algorithm for Timetable Scheduling. 341-346 - Syed Jahangir Badashah, P. Subbaiah:

Design Implementation and Hardware Structure for Image enhancement and surface roughness with Feature Extraction using discrete wavelet transform. 347-352 - Emna Chebbi, Faouzi Benzarti

, Hamid Amiri:
An Improvement of Structural Similarity Index for Image Quality Assessment. 353-360 - Zainab Rasheed Mirza, Muhammad Nawaz Brohi

:
Integrating Radio frequency identification Technology in Academic Management System. 361-365
Volume 10, Number 3, 2014
- Rathi, Viswanathan:

Two phase Clustering method for LEACH Protocol for Effective Cluster Head Selection. 366-375 - Mohamed Osman Ali Hegazi

:
A Conceptual Foundation and Integration Database Designing Model. 376-381 - Sathish Sekar, Shriram K. Vasudevan

, Kaushik Velusamy
, Y. Mrinal Purohit, Ganesh Alagappan, Nivedita Venkatapathy:
Ubiquitous Palm display and fingertip Tracker System using OpenCV. 382-392 - Mahdi Sahlabadi, Ravie Chandren Muniyandi

, Zarina Shukur:
Detecting Abnormal Behavior in Social Network Websites by using a Process Mining Technique. 393-402 - Balachandran Arumugam, P. R. Suresh, Shriram K. Vasudevan

, Kaushik Velusamy
:
Enhancement of total Technical Life of Aero planes. 403-410 - Govindarajalu Bakthavatsalam, K. M. Mehata:

A Case for Hybrid Instruction Encoding for Reducing Code Size in Embedded System-on-Chips based on RISC Processor Cores. 411-422 - Ali Maqousi, Hussein Al-Bahadili:

Evaluating the Performance of the Location-Aided Routing-1p Route Discovery Algorithm. 423-433 - N. Amutha Prabha, Sagar G. V., Venugopal Manikandan:

Migitation of Inter cell Interference and fading in LTE Systems. 434-442 - Lavanya Sankara Narayanan, Murali Baskaran Venugopal:

An Application Specific Windows Management Instrumentation Architecture for Improving Performance on Wireless Network. 443-452 - Widodo Budiharto:

The Access control System based on linear Discriminant Analysis. 453-457 - K. Jayanthi, V. P. Arunachalam

, C. Vasanthanayaki:
Improving the Performance and Reducing bit error rate on Wireless Deep fading Environment receivers. 458-468 - Jagannadham Dulipala, P. Seethalakshmi:

A Novel Architectural Framework for Aggregated subscriber Profile. 469-476 - Khamiss Masaoud S. Algabary, Khairuddin Omar

, Mohd Jan Nordin:
3-dimensional Ear Recognition based iterative Closest Point with stochastic Clustering Matching. 477-483 - P. Prakash, G. Kousalya, Shriram K. Vasudevan

, Kawshik K. Rangaraju:
Distributive Power Migration and Management Algorithm for Cloud Environment. 484-491 - S. Muthukumar, P. K. Jawahar

:
Hit rate Maximization by Logical Cache Partitioning in a Multi-Core Environment. 492-498 - Sevenpri Candra

:
Knowledge Management and Enterprise Resource Planning Implementation: a Conceptual Model. 499-507 - A. Arivoli

, P. Narayanasamy:
C-Load Power control Protocol-Cross-Layer Design of a Network Layer Load Power control Protocol in Wireless Ad Hoc Networks. 508-520 - S. Chakaravarthi, V. Ramachandran:

Permutation of Httpi and HTTPS in Web Services against Attacks for Security enhancement. 521-529 - Lydia Abdul Hamid, Dzati Athiar Ramli:

Quality based speaker Verification Systems using fuzzy Inference fusion Scheme. 530-543 - B. Hari Krishna, S. Ravi:

Reconfiguring Evolved Circuits using controller: a Real Time Approach. 544-551
Volume 10, Number 4, 2014
- S. Muruganathan, N. Devarajan, D. Chitra, T. Manigandan:

Shape Retrieval through Mahalanobis Distance with Shortest Augmenting Path Algorithm. 552-562 - C. Mahesh, E. Kannan, M. S. Saravanan:

Generalized Regression Neural Network based Expert System for Hepatitis B Diagnosis. 563-569 - Mohammed Hayel Refai, Yuhanis Yusof

:
Partial Rule Match for filtering Rules in Associative Classification. 570-577 - Indira Priya Ponnuvel, Dalim Kumar Ghosh, Arputharaj Kannan

, Sannasi Ganapathy
:
Neuro fuzzy Link based Classifier for the Analysis of Behavior Models in Social Networks. 578-584 - Veenu Mangat

, Renu Vig
:
An Algorithm for Mining Usable Rules using a Holistic Swarm based Approach. 585-592 - Siddhartha Sankar Biswas, Bashir Alam

, Mohammad Najmud Doja:
A Refinement of Dijkstra's Algorithm for Extraction of Shortest Paths in generalized Real Time-multigraphs. 593-603 - Abdul Haris Rangkuti:

Content based Batik Image Classification using wavelet transform and fuzzy Neural Network. 604-613 - Shanmugarathinam Ganesarathinam

, Kanniappan Vivekanandan:
Cluster based Cache Consistency using Agent Technique in Mobile Environment. 614-622 - R. Vanithamani

, G. Umamaheswari:
Speckle Reduction in ultrasound Images using Neighshrink and bilateral filtering. 623-631 - Nidhal Khdhair El Abbadi, Abbas Hussien Miry:

Automatic Segmentation of Skin Lesions using Histogram thresholding. 632-639 - N. Danapaquiame, E. Ilavarasan, Neeraj Kumar

:
A Framework to magnitude the Performance and Behavior of Web Services using Ontology. 640-646 - Senthilkumar Chennakrishnan, Midthe Vijayaraghavan Srinath:

Software Process Maturity and Capability Evaluation and its Implementation in the areas of E-Learning Organizations. 647-651 - Aamir Shahzad, Shahrulniza Musa

, Abdulaziz Aborujilah
, Muhammad Irfan:
A New Cloud based supervisory control and Data Acquisition Implementation to Enhance the Level of Security using Testbed. 652-659 - J. Ramya, B. Parvathavarthini

:
Feed Forward Back Propagation Neural Network based Character Recognition System for Tamil Palm Leaf Manuscripts. 660-670 - Mutasem Alsmadi

, Usama Badawi
, Hatem M. Moharram:
Server Failures Enabled JavaSpaces Service. 671-679 - Ranjana Ponraj, George Amalanathan:

Optimizing Multiple travelling Salesman Problem considering the Road Capacity. 680-688 - Abdulkareem Al-Alwani:

A Novel Email response Algorithm for Email Management Systems. 689-696 - Hermawan Syahputra

, Agus Harjoko
, Retantyo Wardoyo
, Reza Pulungan
:
Plant Recognition using Stereo Leaf Image using Gray-Level Co-Occurrence Matrix. 697-704 - C. P. Sumathi, Gadi Gayathri Devi

:
Automatic Text Extraction from Complex Colored Images using Gamma correction method. 705-715 - Nidal Yousef, Aymen M. Abu-Errub, Ashraf Odeh, Hayel Khafajeh:

An Improved Arabic Word's roots Extraction method using n-Gram Technique. 716-719
Volume 10, Number 5, 2014
- Baseera, Srinath:

Design and Development of a Recommender System for E-Learning Modules. 720-722 - Praveena Murugesan, Thanushkodi Keppanagounder:

Design of Optimal Carry Skip Adder and Carry Skip BCD Adder using Reversible Logic Gates. 723-728 - Auxeeliya Jesudoss, S. V. Kasmir Raja, Ashraph Sulaiman:

A Broadcast based Routing Protocol for Inter-Cluster Data Dissemination in Vehicular Communication. 729-736 - C. G. Ravichandran, S. Venkateshbabu:

High Speed Probabilistic Adder for signal Processing Subsystems. 737-744 - H. Anandakumar

, K. Umamaheswari
:
Energy Efficient Network Selection using 802.16g based GSM Technology. 745-754 - Julio Cezar Zanoni, Milton Pires Ramos, Cesar Augusto Tacla

, Gilson Yukio Sato
, Gregory Moro Puppi Wanderley, Emerson Cabrera Paraiso
:
Comente+: a Tool for Improving Source Code Documentation using Information Retrieval. 755-762 - K. Nirmala Devi, A. Tamilarasi

:
Improving Fault Tolerant Resource Optimized Aware Job Scheduling for Grid Computing. 763-773 - Krishnamoorthy Natarajan

, Ramasamy Asokan, Sangeetha Subramanian:
Quantitative Evaluation of Job and Resources for Better Selection to Improve makespan in Grid Scheduling. 774-782 - C. Vivek, S. Audithan:

A Novelty Approach of Spatial Co-Occurrence and discrete Shearlet transform based texture Classification using LPboosting Classifier. 783-793 - Nawzat Sadiq Ahmed, Norizan Mohd Yasin:

Factors affecting Cooperation among Physicians in Sharing Information within the Hospital Environment: a Study of two Hospitals. 794-808 - P. Kalaivani, K. L. Shunmuganathan

:
An Agent based Framework for Sentiment Classification of Online Reviews using Ontology. 809-820 - P. G. V. Ramesh

, Prita Nair:
Evaluation of Hidden Markov Model based adaptive Provisioning of optical burst switching Networks Amenable for Upgradation to Green Flexigrid Networks. 821-827 - Insaf Bellamine, Hamid Tairi

:
Motion Detection using the Space-Time Interest Points. 828-839 - P. Prabhakaran, C. Nelson Kennedy Babu:

Cluster based Architecture for localization and tracking in Wireless Sensor Network. 840-843 - Edy Winarno

, Agus Harjoko
, Aniati Murni Arymurthy, Edi Winarko
:
Improved Real-Time Face Recognition based on three Level wavelet Decomposition-Principal Component Analysis and Mahalanobis Distance. 844-851 - Kittipol Wisaeng, Nualsawat Hiransakolwong, Ekkarat Pothiruk:

Identification of exudates using fuzzy Mathematical Morphology. 852-860 - N. Hema Priya, A. M. Shobana Priya, S. Chandramathi:

Qos based Selection and Composition of Web Services-a fuzzy Approach. 861-868 - Mariana D. C. Lima, Silvia M. Nassar, Pedro Ivo R. B. G. Rodrigues, Paulo José de Freitas Filho, Carlos M. C. Jacinto:

Heuristic discretization method for Bayesian Networks. 869-878 - Nidhal Khdhair El Abbadi, Enas Hamood Al Saadi:

Blood vessel diameter Measurement on retinal Image. 879-883 - V. S. Chandrika, A. Ebenezer Jeyakumar:

On the Detection of Open and Short Fault in switched Reluctance motor with Classification. 884-895
Volume 10, Number 6, 2014
- K. Devaki, V. Murali Bhaskaran:

A Novel Approach to Detect Fissures in Lung CT Images using Marker-based Watershed Transformation. 896-905 - Anthony N. Ilukwe, Yevgen Biletsky:

Hybrid Search and Delivery of Learning Objects System. 906-924 - A. Haris Rangkuti, Agus Harjoko, Agfianto Eko Putra:

Content based Batik Image Retrieval. 925-934 - S. Balaji, N. Vasudevan:

Cuckoo Search-Aided LMS Algorithm for channel estimation in MC-CDMA Systems. 935-947 - VijayaKumar G. Dhas, S. Saibharath, V. Rhymend Uthariaraj:

Using Mobile Agents for Load Balancing in Peer-to-Peer Systems Hosting Virtual Servers. 948-960 - Alaa Mohamed Youssef, Mohamed S. El-Mahallawy

, Amr Badr:
Egyptian License plate Recognition using Enhanced Stroke Width Transformation and fuzzy ARTMAP. 961-969 - Binod Kumar Pattanayak, Mamata Rath

:
A Mobile Agent based Intrusion Detection System Architecture for Mobile Ad Hoc Networks. 970-975 - Agus Buono, Imas Sukaesih Sitanggang, Mushthofa, Aziz Kustiyo:

A Time-delay Cascading Neural Network Architecture for Modeling Time-dependent predictor in onset Prediction. 976-984 - R. Malini, C. Vasanthanayaki:

Color perception Histogram for Image Retrieval using Multiple Similarity Measures. 985-994 - A. K. Mwinyi, Syed Abdul Rahman Al-Haddad, Shaiful Jahari Bin Hashim

, R. Bin Hj Abdullah:
Review on Multi-Agent System Collaboration in Learning Management System Domain by Deploying Wireless Sensor Networks for Student Location Detection. 995-1002 - A. Pandian, Md. Abdul Karim Sadiq:

Authorship Categorization in Email Investigations using Fisher's linear Discriminant method with radial Basis function. 1003-1014 - Seyed Reza Hasani, Zulaiha Ali Othman, Seyed Mostafa Mousavi Kahaki

:
Hybrid Feature Selection Algorithm for Intrusion Detection System. 1015-1025 - R. Palson Kennedy, T. V. Gopalakrishnan

:
An Effective Optimized Genetic Algorithm for Scalable Information Retrieval from Cloud using Big Data. 1026-1035 - Walaa E. Elhady, Heba A. Elnemr, Gamal Selim:

Implementation and Evaluation of Image Processing Techniques on a Vision Navigation Line follower robot. 1036-1044 - K. Padmapriya

, Sridhar Sundaramoorthy:
Finding a residence with All Facilities using Nearest Neighbor Search. 1045-1050 - Jaafar A. Aldhaibani

, Abid Yahya, R. Badlishah Ahmad, Rashid A. Fayadh, Ameer H. Abbas:
Reducing transmitted Power of Moving Relay Node in Long-Term Evolution-Advanced Cellular Networks. 1051-1061 - Ahmed Jumaa Alsaket, Mohd Juzaiddin Ab Aziz

:
Arabic-Malay Machine Translation using Rule-based Approach. 1062-1068 - L. Ramaparvathy:

A New-Threshold based Job Scheduling for Grid System. 1069-1076 - Amandeep, G. Geetha

:
Implications of Bitsum Attack on Tiny Encryption Algorithm and XTEA. 1077-1083 - Maicon A. Sartin

, Alexandre C. R. da Silva, Claudinei Kappes
:
Image Segmentation with Artificial Neural Network for nutrient deficiency in Cotton crop. 1084-1093
Volume 10, Number 7, 2014
- N. Shylashree, V. Sridhar:

Hardware Realization of High Speed Elliptic Curve Point Multiplication using Precomputation over GF(P). 1094-1106 - P. Nalina, T. Meenambal, R. Sathyanarayan Sridhar:

Slope stability Analysis of Kallar-Coonoor Hill Road Stretch of the Nilgiris. 1107-1114 - Gianluca Costa, Claudia D'Ambrosio

, Silvano Martello:
Graphsj 3: a Modern Didactic Application for Graph Algorithms. 1115-1119 - Saravanan Dhavamani, Chandarasekaran Ramasamy, M. G. Sharavana Kumar:

Trustworthy Enabled Reliable Communication Architecture in Mobile Ad Hoc Network. 1120-1129 - R. M. Bommi

, S. Selvakumar Raja:
All optical Implementation of High Speed and low Power Reversible Full Adder using semiconductor optical amplifier based Mach-Zehnder Interferometer. 1130-1134 - M. Saravanan

, K. Suresh Manic
:
Novel Reversible variable Precision Multiplier using Reversible Logic Gates. 1135-1138 - Md. Ashad Alam

, Kenji Fukumizu
:
Hyperparameter Selection in Kernel Principal Component Analysis. 1139-1150 - P. Vasudevan:

Iterative Dichotomiser-3 Algorithm in Data Mining Applied to Diabetes Database. 1151-1155 - A. Paulin Florence, V. Shanthi:

A Load Balancing Model using Firefly Algorithm in Cloud Computing. 1156-1165 - A. S. Ghabayen, Shahrul Azman Noah

:
Exploiting Social Tags to Overcome cold Start Recommendation Problem. 1166-1173 - K. Sridharan

, M. Chitra
:
Trust based Automatic Query formulation Search on Expert and Knowledge Users Systems. 1174-1185 - N. Rajkumar, K. Senthil Kumar

, P. Subha, R. Kavitha:
An Efficient Hybrid Algorithm to Reduce Latency in Ad-Hoc Aggregation. 1186-1196 - Bashar Aubaidan, Masnizah Mohd, Mohammed Albared

:
Comparative Study of k-means and k-Means++ Clustering Algorithms on Crime Domain. 1197-1206 - G. Geetha

, C. Jayakumar
:
Secure Communication Protocol for Protecting Computation Result of Free Roaming Mobile Agent. 1207-1215 - C. Balamurugan, M. Viswanathan, T. Abhishek Kumar, G. S. Raj:

Detection of flood Attacks in DTN using rate limiter Technique. 1216-1221 - Nidhal K. El Abbadi

, Adil Mohamad, Mohamed AbdulHameed:
Image Encryption based on singular Value Decomposition. 1222-1230 - S. Mohan

, K. Venkatachalapathy, P. Sudhakar:
An Intelligent Recognition System for identification of Wood species. 1231-1237 - Oh-Chul Kwon, Jusung Kim, Chang-Gun Lee:

Adaptive I/O switching for Seamless convergence of Smart phones and External I/O Devices. 1238-1248 - Afan Galih Salman, Rojali, Bayu Kanigoro

, Nayoko:
Steganography Application Program using the ID3v2 in the MP3 audio File on Mobile phone. 1249-1252 - Maya Eapen, Reeba Korah

:
Medical Image Segmentation for Anatomical Knowledge Extraction. 1253-1258 - Nik Mohd Ramli Nik Yusoff, Helmi Zulhaidi Mohd Shafri, Ratnasamy Muniandy, Islam Mohammad Wali:

Development of obstacle avoidance Technique in Web-based Geographic Information System for Traffic Management using Open Source Software. 1259-1268 - Amr Adel, Essam El Fakharany, Amr Badr:

Clustering Tweets using Cellular Genetic Algorithm. 1269-1280 - R. Pugalenthi

, T. V. Gopal
:
An Efficient and variable interval Rekeying for Dynamic Ad Hoc Multicast Group using Key Path Reduction. 1281-1290 - Shobhanjaly P. Nair, K. Silambarasan, N. Bindhu, R. Srinivasan

:
A Bio-Surveillance System using Efficient Algorithm for Information Sharing Applications. 1291-1297 - Hasan Kahtan

, Nordin Abu Bakar, Rosmawati Nordin:
Dependability Attributes for increased Security in Component-based Software Development. 1298-1306 - S. Saravanakumar, A. Ebenezer Jeyakumar, K. N. Vijeyakumar:

Removal of High density impulse noise using Morphological based adaptive unsymmetrical trimmed mid-Point filter. 1307-1314 - K. Chandramohan, P. Kamalakkannan:

Traffic controlled-Dedicated Short Range Communication: a Secure Communication using Traffic controlled Dedicated Short Range Communication Model in Vehicular Ad Hoc Networks for Safety Related Services. 1315-1323 - Ayman H. Nasr

, Ghada Samy El-Tawel, Ashraf K. Helmy:
Super Resolution for Egyptsat-1 Images with erratic Shift. 1324-1335 - K. Sasi Kala Rani

, J. Suganthi:
Improving Quality of Service in IP Networks for Multimedia Applications with Optimal Fragmentation. 1336-1343 - Rosilah Hassan, Amjed Sid Ahmed

, Nur Effendy Othman, Samer Sami:
Enhanced encapsulated Security payload a New Mechanism to Secure Internet Protocol Version 6 over Internet Protocol Version 4. 1344-1354
Volume 10, Number 8, 2014
- Ahmed Tobal, Sahar A. Mokhtar

:
Weeds identification using Evolutionary Artificial Intelligence Algorithm. 1355-1361 - S. J. Grace Shoba, A. Brintha Therese:

A modified Spatial fuzzy C-means Clustering Algorithm for Detecting Glaucomain retinal fundus Images. 1362-1372 - G. Joselin Retna Kumar

, K. S. Shaji
:
Neuro fuzzy based Performance Analysis of multiband ultra Wide band orthogonal frequency Division Multiplexing System. 1373-1379 - Waheed Yasin, Hamidah Ibrahim, Nur Izura Udzir, Nor Asilah Wati Abdul Hamid

:
Windows Web Proxy Caching simulation: a Tool for simulating Web Proxy Caching under Windows Operating Systems. 1380-1388 - Inass Shahadha Hussein, Mohd Jan Nordin:

Palmprint Verification using Invariant moments based on wavelet transform. 1389-1396 - Dhanasekaran Raghavan

, G. Singaravel
:
Denial of Service Attack in Distributed Wireless Network by Distributed jammer Network: a Birth-Death Random Process Analysis. 1397-1402 - M. Ravichandran, A. Shanmugam:

Combination of difference subspace and Oppurtunistic Clustering on High dimensional Data. 1403-1410 - Hasan Kahtan

, Nordin Abu Bakar, Rosmawati Nordin:
Awareness of Embedding Security Features into Component-based Software Development Model: a Survey. 1411-1417 - R. Lakshmana Kumar

, M. S. Irfan Ahmed:
Semantic Enhanced UDDI using OWL-S Profile Ontology for the Automatic Discovery of Web Services in the Domain of Telecommunication. 1418-1422 - Luciane Telinski Wiedermann Agner, Inali Wisniewski Soares, Jean Marcelo Simão

, Paulo Cézar Stadzisz:
Applying Black-Box Testing to Model Transformations in the Model Driven Architecture Context. 1423-1427 - Ibrahim Ahmed Al-Baltah, Abdul Azim Abdul Ghani, Wan Nurhayati Wan Ab. Rahman

, Rodziah Binti Atan
:
Semantic Conflicts Detection of Heterogeneous Messages of Web Services: Challenges and solution. 1428-1439 - Aditya Kurniawan

, Bina Bestina Harefa, Surya Sujarwo
:
Unified Modeling Language Tools Collaboration for Use Case, class and Activity Diagram Implemented with HTML 5 and JavaScript Framework. 1440-1446 - D. Raghupathikumar, K. Bommanna Raja:

A combined low Latency and Weighted Fair Queuing based Scheduling of an input-Queued Switch. 1447-1457 - B. Swaminathan

, Sheila Anand:
A Multi Attribute Ranking Mechanism for Peer-to-Peer Networks. 1458-1465 - Adnan Ahmed

, Kamalrulnizam Abu Bakar
, Muhammad Ibrahim Channa:
Performance Analysis of Adhoc on demand Distance Vector Protocol with Blackhole Attack in WSN. 1466-1472 - G. Jayamurugan, P. Kamalakkannan:

Detecting Multiple Intrusion Attacks using Permanent girth Clustering Model in Wireless Sensor Network. 1473-1479 - V. Karthikeyan, S. Ravi

, M. Anand
:
Robust Memory Management using Real Time Concepts. 1480-1487 - Nidhal K. El Abbadi

, Lamis Al Saadi:
Fast Image Matching in Huge Database. 1488-1496 - B. Thenkalvi, S. Murugavalli

:
Image Retrieval using certain Block based difference of inverse Probability and certain Block based variation of Local Correlation coefficients Integrated with wavelet moments. 1497-1507 - A. S. Radhamani, E. Baburaj

:
Low Complexity Constraints for Energy and Performance Management of Heterogeneous Multicore Processors using Dynamic Optimization. 1508-1516 - Sartika Kurniali:

An Approach to Online Learning using Learning Management System in Higher Education Institution. 1517-1521 - Robertus Nugroho Perwiro Atmojo, Anggita Dian Cahyani:

Recommendations for Development of Online bookstore in Indonesia: a Review from Writer's Perspective. 1522-1530 - M. Nirmala

, Ramachandra V. Pujeri:
Performance of Transmission control Protocol Congestioncontrol Algorithms on Teledesic satellites constellations. 1531-1542 - A. Rajesh

, Mohan Ellappan:
Classification of Microcalcification based on wave atom transform. 1543-1547 - Asaad Noori Hashim

, Zahir M. Hussain
:
Novel Image-dependent Quality Assessment Measures. 1548-1560 - P. R. Jasmine Jeni, Asokan Vimala Juliet

, A. Messiah Bose:
An Enhanced Route Failure Recovery Model for Mobile Ad Hoc Networks. 1561-1568 - S. P. Karuppiah, S. K. Srivatsa:

An Innovative Morphological Approach for noise removal cum Edge Detection for Digitized Paintings. 1569-1574 - Siham Ezzouak, Mohammed El Amrani, Abdelmalek Azizi

:
A variant of Pollard's rho Attack on Elliptic Curve Cryptosystems. 1575-1581 - R. Ganesh Kumar

, Y. S. Kumaraswamy:
Spline activated Neural Network for Classifying Cardiac arrhythmia. 1582-1590 - R. Niruban

, T. Sree Renga Raja, T. Sree Sharmila
:
Novel Color filter array demosaicing in frequency Domain with Spatial Refinement. 1591-1599
Volume 10, Number 9, 2014
- Idris Abubakar Umar, Zurina Mohd Hanapi

:
Comparative Study on Energy Consumption in Dynamic Window Secured Implicit Geographic Forwarding Routing Protocol. 1600-1607 - J. Manoranjini, A. Chandrasekar:

Dedicated Trustee detector of Black Holes in MANETs. 1608-1616 - Dahlia Sam

, Velankanni Cyril Raj:
A Time Synchronized Hybrid Vehicular Ad Hoc Network of Roadside Sensors and Vehicles for Safe driving. 1617-1627 - Amal Latrache, El Habib Nfaoui

, Jaouad Boumhidi
:
A Mobile Agent based Approach for Automating “Discover-Compose” Process of Semantic Web Services. 1628-1641 - M. Thangavel, M. Chandrasekaran, M. Madheswaran:

Carotid plaque Classification using Contourlet Features and Support Vector Machines. 1642-1649 - Nafeesa Begum Jeddy, Krishnan Kumar, Vembu Sumathy:

Hierarchical Access control in Dynamic Peer Groups using Symmetric Polynomial and Tree based Group Elliptic Curve Diffie Hellman Scheme. 1650-1665 - Afan Galih Salman, Ro'fah Nur Rachmawati

, Hendry:
Euro-USD Prediction Application using Weighted Moving Average on Mobile Device. 1666-1671 - K. Selvarangam, K. Ramesh Kumar:

Selecting Perfect Interestingness Measures by coefficient of variation based Ranking Algorithm. 1672-1679 - C. Prema, D. Manimegalai:

Fusion of Color and modified Weber's Law descriptor based Human Skin Detection. 1680-1691 - A. Selwin Mich Priyadharson

, M. S. Saravanan, N. Gomathi, S. Vinson Joshua
, A. Mutharasan:
Energy Efficient Flow and Level control in a hydro Power plant using fuzzy Logic. 1703-1711 - R. Kumar

, G. Kousalya
:
Cognitive Agents based Security Scheme to Handle Routing Loops in Wireless Networks. 1712-1724 - Abdelrafe Elzamly, Burairah Hussin:

A Comparison of Stepwise and fuzzy Multiple Regression Analysis Techniques for Managing Software Project Risks: Analysis phase. 1725-1742 - V. Kaviha, V. Kannan

, S. Ravi
:
Implementation of Central Queue based Realtime Scheduler for Multiple Source Data Streaming. 1743-1751 - T. Blesslin Sheeba

, P. Rangarajan:
A Novel Substitution Box Design for humming Bird-2 against Side channel Attack. 1752-1757 - Bahareh Nakisa

, Mohd Zakree Ahmad Nazri, Mohammad Naim Rastgoo
, Salwani Abdullah:
A Survey: Particle Swarm Optimization based Algorithms to solve premature convergence Problem. 1758-1765 - S. Thangalakshmi

, P. Valsalal:
Congestion Management by Optimal Allocation of Facts controllers using Hybrid fish Bee Optimization. 1766-1775 - S. Yasodha, S. S. Dhenakaran:

Ontopark: Ontology based Page Ranking Framework using Resource Description Framework. 1776-1781 - S. A. A. Fayoumi, A. A. Hegazy, M. A. Belal:

Genetic-based Nutrition Recommendation Model. 1782-1791 - Ananthi Jebaseeli SamuelRaj, Sundararajan Jayapal

, Vijayaraghavan Varadharajan:
Network Mobility Supported Proxy Mobile IPv6. 1792-1797 - Tamilarasi Karuppiah

, M. Ramakrishnan:
Intelligent Search Engine-based Universal Description, Discovery and Integration for Web Service Discovery. 1798-1810 - Joseph Issa:

Hybrid Implementation and Performance Analysis for High Performance Computation Workload. 1811-1818 - T. Vimala, Uma Rajaram:

Self Powered Energy Aware Internet of Things. 1819-1826 - Arulmurugan Ramu

, P. Sengottuvelan:
Classification of Digital Images using fusion elevated order Classifier in wavelet Neural Network. 1827-1838 - Abdellah Idrissi

, Fadoua Yakine
:
Multicast Routing with Quality of Service Constraints in the Ad Hoc Wireless Networks. 1839-1849 - K. Santhi

, B. Parvathavarthini
:
Performance Analysis of Randomized Reverse Ad Hoc on demand Distance Vector Routing Protocol in MANET. 1850-1858 - A. Sumathi, B. Vinayagasundaram:

Evaluating an Authenticated Trust based Adhoc on demand Distance Vector for Malicious Nodes Isolation in MANET. 1859-1864 - Rund Mahafdah, Nazlia Omar

, Omaia Al-Omari
:
Arabic Part of speech Tagging using k-Nearest Neighbour and Naive Bayes Classifiers Combination. 1865-1873 - Jayanthi Gokulakrishnan

, V. Thulasi Bai:
Performance of Topology Aware Reliable Routing Protocol for Large Scale Virtual Private Network. 1874-1880 - N. Yamuna Devi, J. Devi Shree:

A Combintorial Tree based Frequent Pattern Mining. 1881-1889
Volume 10, Number 10, 2014
- Iman Ahmed Mahmoud, Amr A. Badr, Mostafa Abdel Azim:

A Comparative Study for rhodopsin protein Folding Problem. 1890-1899 - C. Geetha

, M. Ramakrishnan:
Extended-Randomized, Efficient, Distributed: a Dynamic Detection of clone Attacks in Static Wireless Sensor Networks. 1900-1907 - V. Anitha, S. Murugavalli

:
Brain tumor Classification based on Clustered discrete cosine transform in Compressed Domain. 1908-1916 - S. A. AlFayoumi, A. A. Hegazy, M. A. Belal:

Influence of Evolutionary Computing on Nutrition Recommendation: a Survey. 1917-1923 - Arun Ambashanker, Palanisamy Nirmal Kumar:

Sopc based Wireless Remote Patient Monitoring using ultra Lightweight Cryptography. 1924-1928 - R. Anitha

, Saswati Mukherjee:
Metadata Driven Efficient Key Generation and Distribution in Cloud Security. 1929-1938 - Omid Seifaddini, Azizol Abdullah

, Shamala Subramaniam:
An Event Driven simulation for adaptive Gentle Random Early Detection (Agred) Algorithm. 1939-1945 - M. Thirumaran, M. Jannani, P. Dhavachelvan:

Optimized Incident Matching and Auto-Mated Verification of Composition PAT-terns in Long Term Composed Services. 1946-1954 - Sanjay K. Dwivedi, Ajay Kumar Bharti:

Process Mapping for Service Delivery through NSDG in Public Transportation in India. 1955-1960 - Khalid Khalifa, Nazlia Omar

:
A Hybrid method using Lexicon-based Approach and Naive Bayes Classifier for Arabic Opinion Question Answering. 1961-1968 - Ratnavel Rajalakshmi

:
Supervised Term Weighting Methods for URL Classification. 1969-1976 - S. Chitrakala

, S. P. Surendernath, R. Priyatharshini
:
Constraint Sovling Engine based Nurse rostering with Intelligent Backtracking. 1977-1984 - M. Elkhal, Abdelghni Lakehal, Khalid Satori

:
A New method for 3D Shape Indexing and Retrieval in Large Database by using the Level Cut. 1985-1993 - T. S. Arulananth, T. Jayasingh, S. Ravi:

Tracking the position of Multiple Human Gestures using Contour Mapping Algorithm. 1994-2005 - Aamir Shahzad, Shahrulniza Musa

, Abdulaziz Aborujilah
, Muhammad Irfan:
The Security Survey and Anaylsis on supervisory control and Data Acquisition Communication. 2006-2019 - V. Venkatesan, A. Sankar:

Investigation of Student's Personality on Pair Programming to Enhance the Learning Activity in the Academia. 2020-2028 - Mehdi Barati, Azizol Abdullah

, Nur Izura Udzir, Mostafa Behzadi, Ramlan Mahmod, Norwati Mustapha:
Intrusion Detection System in Secure Shell Traffic in Cloud Environment. 2029-2036 - Wesam Bhaya

, Mehdi Ebady Manaa
:
Review Clustering Mechanisms of Distributed Denial of Service Attacks. 2037-2046 - K. Munusamy, R. M. S. Parvathi:

Sensor Network periodical Data assembly using Imbalanced Clustering Energy Efficient Mechanism. 2047-2054 - Yulius Lie

, Bens Pardamean
:
Critical Success Factors-based Content Management System Development for Small and Medium Size Enterprises. 2055-2059 - Rohollah Moosavi Tayebi, Puteri Suhaiza Sulaiman

, Rahmita Wirza, Mohd Zamrin Dimon, Suhaini B. Kadiman, Fatimah Khalid
, Samaneh Mazaheri:
A Fast and accurate method for Automatic coronary arterial Tree Extraction in angiograms. 2060-2076 - D. Sumathi, Ramachandra V. Pujeri:

A modified Elliptic Curve Digital Signature Algorithm for Public Verifiability with Data dynamics in Cloud Computing. 2077-2087 - A. Siva Sangari

, J. Martin Leo Manickam:
A light-weight Cryptography Analysis for Wireless based Healthcare Applications. 2088-2094 - Nidhal K. El Abbadi

, Adil Al Rammahi, Dheiaa Shakir Redha, Mohamed AbdulHameed:
Image Compression based on SVD and MPQ-BTC. 2095-2104 - G. M. Karthik, S. Karthik:

Frequent correlated periodic Pattern Mining for Large Volume Set using Time Series Data. 2105-2116 - Budi Yulianto

, Lusiana Citra Dewi:
Beeboard: from Wiimote to Interactive whiteboard Application for Classroom. 2117-2123 - Gabriel Ferreira Araújo, Hendrik T. Macedo, Marco Túlio Chella, Carlos-Alberto Estombelo-Montesco, Marcus Medeiros:

Parallel Implementation of Expectation-maximisation Algorithm for the Training of Gaussian Mixture Models. 2124-2134 - Saini Jacob Soman, S. Murugappan:

A Study of Spam Detection Algorithm on Social Media Networks. 2135-2140 - Rocco Furferi

, Lapo Governi
, Luca Puggelli
, Yary Volpe
:
Improved Interactive method for Reco-Vering 2.5D Models from single Images. 2141-2154 - G. M. Rajathi

, R. Rangarajan, R. Haripriya, R. Nithya:
Fuzzy Shrink Image denoising using smoothing spline estimation. 2155-2163
Volume 10, Number 11, 2014
- Jesus Friginal

:
Emerging Trends in adaptive Computation for MobiQuitous Systems. 2164 - Joachim Perchat, Mikael Desertot, Sylvain Lecomte:

Common Framework: a Hybrid Approach to Integrate Cross-Platform Components in Mobile Application. 2165-2181 - Ahmed Soua, Hossam Afifi:

Adopel: adaptive Data Collection Protocol using Reinforcement Learning for VANETs. 2182-2193 - Luiz Angelo Steffenel

, Olivier Flauzac, Andrea Schwertner Charão
, Patrícia Pitthan Barcelos, Benhur de Oliveira Stein, Guilherme W. Cassales, Sergio Nesmachnow
, Javier Rey, Matias Cogorno, Manuele Kirsch-Pinheiro, Carine Souveyet:
Mapreduce Challenges on Pervasive Grids. 2194-2210 - Britton Wolfe, James Harpe:

Incorporating Prior Knowledge into Temporal difference Networks. 2211-2219 - Anas A. Abboud

, Rahmita Wirza O. K. Rahmat, Suhaini B. Kadiman, Mohd Zamrin Dimon, Lili Nurliyana Abdullah, M. Iqbal Saripan
, Hasan H. Khaleel
:
Cavity Segmentation and Stroke Volume Measurement Methods from Echocardiographic Images: Review. 2220-2231 - Aisha Adel, Nazlia Omar

, Adel Al-Shabi:
A Comparative Study of combined Feature Selection Methods for Arabic Text Classification. 2232-2239 - Naragain Phumchusri, Julie L. Swann:

Dynamic Pricing with updated demand for the Sports and Entertainment Ticket Industry. 2240-2252 - Abed Saif Alghawli:

Modelling the switching Link and Mathematical of Actual Traffic. 2253-2259 - S. V. Kasmir Raja, V. Rajitha, Meenakshi Lakshmanan:

Computational Model to Generate Case-Inflected Forms of masculine Nouns for Word Search in Sanskrit E-Text. 2260-2268 - Asmhan Flieh Hassan, Cailin Dong, Zahir M. Hussain

:
An Information-Theoretic Image Quality Measure: Comparison with Statistical Similarity. 2269-2283 - R. Vimal Karthick, G. S. Raj, R. Srinivasan

, S. Sibi Chakkaravarthy, P. Visu
:
Asynchronous Time encoder based quasi-Static modelling for Human Area Network in VANET. 2284-2291 - J. Nithyashri, G. Kulanthaivel:

A Gaussian Mixture Model for Classifying the Human Age using DWT and Sammon Map. 2292-2298 - Marwan Ibrahim Alshar'e, Rossilawati Sulaiman

, Mohd Rosmadi Mokhtar, Abdullah Mohd Zin
:
Design and Implementation of the TPM User Authentication Model. 2299-2314 - Mutlaq B. Alotaibi

:
Exploring Users' Attitudes and Intentions toward the Adoption of Cloud Computing in Saudi Arabia: an Empirical Investigation. 2315-2329 - K. G. Madhwaraj:

Empirical Comparison of two Metrics Suites for Maintainability Prediction in packages of Object-Oriented Systems: a Case Study of Open Source Software. 2330-2338 - Nada A. Rasheed

, Mohd Jan Nordin:
A Polynomial function in the Automatic Reconstruction of Fragmented Objects. 2339-2348 - M. Sujitha, V. Kannan

, S. Ravi:
Rtos Implementation of non-linear System using Multi Tasking, Scheduling and Critical Section. 2349-2357
Volume 10, Number 12, 2014
- Tan Yan, Liudmila Ulanova, Ye Ouyang

, Fengyuan Xu:
Data Mining in Time Series: Current Study and Future Trend. 2358-2359 - Rahib H. Abiyev:

Facial Feature Extraction Techniques for Face Recognition. 2360-2365 - Fawaz S. Al-Anzi

, Shafiullah Khan
:
Wireless Mesh Network Cross-Layer Intrusion Detection. 2366-2373 - Carmen Joham, Majharul Talukder, Mohammed Aseeri:

Innovation through a Self-Organization Lens. 2374-2382 - Oi-Mean Foong, Jing-Mei Yong, Suziah Sulaiman, Dayang Rohaya Awang Rambli:

Mobile Health Awareness in pre-Detection of mild Stroke Symptoms. 2383-2394 - Achmad Nizar Hidayanto, Arfian Herbowo, Nur Fitriah Ayuning Budi, Yudho Giri Sucahyo

:
Determinant of Customer Trust on E-Commerce and its Impact to Purchase and Word of Mouth Intention: a Case of Indonesia. 2395-2407 - Atieh Khanjani, Wan Nurhayati Wan Ab. Rahman

, Abdul Azim Abdul Ghani:
Feature-based Analysis into the Trend of Software Technologies from Traditional to Service Oriented Architecture and SaaS Cloud. 2408-2414 - P. Pradeepa, Ila Vennila:

Multimodal retinal Image Registration using RANSAC Matching and Gradient ICP Algorithm. 2415-2421 - Sri Suwarno

, Subanar
, Agus Harjoko
, Sri Hartati
:
Estimation of Fingerprint Orientation field by utilizing Prior Knowledge and Self-Organizing Map. 2422-2428 - Hung-Yi Teng, Chun-Hung Wu, Ren-Hung Hwang

:
Optimal Resource Allocation for Layered video Multicasting in WiMAX. 2429-2441 - Rohaya Latip, Zulaile Mabni, Hamidah Ibrahim, Azizol Abdullah

, Masnida Hussin:
A Clustering-based Hybrid Replica control Protocol for High Availability in Grid Environment. 2442-2449 - Mohsen Gharakhani

, Forough Zarea Fazlelahi
, Seyed Jafar Sadjadi
:
A robust Optimization Approach for Index tracking Problem. 2450-2463 - Henry Chong, Hantze Sudarma, Ferdinand Ariandy Luwinda, Ikhtiar Faahakhododo, Ford Lumban Gaol:

Wirest Lang Lab: Mobile Platform Language Laboratory based on REST Web Service. 2464-2468 - Mamadou Diop, Chot Hun Lim, Tien Sze Lim, Lee-Yeng Ong

:
A Vision-based travelled Distance estimation Algorithm in an indoor Environment using a Mobile robot. 2469-2480 - Qilong Zhang, Fei Qin:

A low-Cost Effective UWB Location System based on frequency synthesis Technology. 2481-2487 - Benfano Soewito

, Yonathan Marcellinus, Manik Hapsara
:
Secure Wireless Ad Hoc Networks using Zero Knowledge Proof. 2488-2493 - Aslina Baharum

, Azizah Jaafar:
Evaluation of ASEAN Mental Models Pattern of Web User-Centered Interface Design using eye-tracking Technology. 2494-2506 - Faraj El Dabee, Romeo M. Marian, Yousef Amer

:
A Genetic Algorithm for a simultaneous optimisation of Cost-Risk Reduction under a Just-in-Time Adaption. 2507-2517 - Ika Alfina

, Joni Ero, Achmad Nizar Hidayanto, Muhammad Rifki Shihab
:
The Impact of Cognitive Trust and E-WOM on Purchase Intention in C2C E-Commerce Site. 2518-2524 - Mohd Jan Nordin, Abdul Aziz K. Abdul Hamid, Sumazly Ulaiman, Rudrusamy U. Gobithaasan

:
Radius based Block Local Binary Pattern on T-Zone Face Area for Face Recognition. 2525-2537 - Lee-Yeng Ong

, Siong-Hoe Lau
, Voon Chet Koo
:
A New Approach of Local Feature Descriptors using moment Invariants. 2538-2547 - Ahmad Shukri Mohd Noor

, Nur Farhah Mat Zian, Md. Yazid Mohd. Saman:
Circular Neighbor Replication. 2548-2552 - Bakri Yahaya, Rohaya Latip, Azizol Abdullah

, Mohamed Othman:
Resource Broker Management by Adopting Self-adaptive Multi-Instance Broker Scheduling in Grid Computing. 2553-2563 - Chot Hun Lim, Tien Sze Lim, Voon Chet Koo

:
Implementation of ANFIS for GPS-Aided INS UAV motion Sensing at Short Term GPS Outage. 2564-2575 - Maizura Ibrahim, Hamidah Ibrahim, Azizol Abdullah

, Rohaya Latip:
Enhancing the Performance of Advanced Fine-Grained Grid Authorization System. 2576-2583 - Mudiana Binti Mokhsin

, Nurlaila Binti Rosli, Suzana Zambri, Nor Diana Ahmad, Saidatul Rahah Hamidi
:
Automatic Music Emotion Classification using Artificial Neural Network based on vocal and instrumental Sound Timbres. 2584-2592 - Mohammed A. Bindrees, Robert J. Pooley, Idris Skloul Ibrahim, Diana S. Bental:

How Public organisational Structures Influence Software Development Processes. 2593-2607 - Danu Wiroteurairuang, Sanun Srisuk, Chom Kimpan, Thanwa Sripramong:

K-means based Image denoising using bilateral filtering and total variation. 2608-2618 - Khairi Abdulrahim, Chris Hide, Terry Moore

, Chris Hill:
Rotating a MEMS inertial Measurement Unit for a foot-mounted Pedestrian Navigation. 2619-2627 - Siti Fajar Jalal

, Masnida Hussin
:
Multi-Level Priority-based Scheduling Model in Heterogeneous Cloud. 2628-2635 - Edhi Juwono

, Harjanto Prabowo, Dyah Budihastuti, Ford Lumban Gaol:
Aligning IT with Business Model to Perform Organizational Capabilities in Achieving Business Performance. 2636-2639 - Quang Huy Dinh, Nasimul Noman

, Hitoshi Iba:
Oscillatory Synthetic biological System Construction using Interactive Evolutionary Computations. 2640-2652 - Bambang Saras Yulistiawan, Harjanto Prabowo, Dyah Budihastuti, Ford Lumban Gaol:

Maturity Model to Measure the Government Institutions of Indonesia (the Environment Bureaucracy of Education) in the Implementation of E-Government. 2653-2657 - Subana Shanmuganathan:

From Data Mining and Knowledge Discovery to Big Data Analytics and Knowledge Extraction for Applications in Science. 2658-2665

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














